First published: Fri Dec 16 2022(Updated: )
The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Netgear Nighthawk AX1800 | <1.0.9.90 | |
Netgear Nighthawk AX1800 Firmware | ||
All of | ||
Netgear Nighthawk AX2400 | <1.0.9.90 | |
Netgear Nighthawk AX2400 | ||
All of | ||
Netgear Nighthawk AX3000 Firmware | <1.0.9.90 | |
Netgear Nighthawk AX3000 | ||
All of | ||
Netgear Nighthawk AX5400 | <1.0.9.90 | |
Netgear Nighthawk AX5400 Firmware | ||
All of | ||
Netgear Nighthawk AX6000 Firmware | <1.0.9.90 | |
Netgear Nighthawk AX6000 Firmware | ||
All of | ||
Netgear Nighthawk AX11000 | <1.0.9.90 | |
Netgear Nighthawk Pro Gaming WiFi 6 Router | ||
Netgear Nighthawk AX1800 | <1.0.9.90 | |
Netgear Nighthawk AX1800 Firmware | ||
Netgear Nighthawk AX2400 | <1.0.9.90 | |
Netgear Nighthawk AX2400 | ||
Netgear Nighthawk AX3000 Firmware | <1.0.9.90 | |
Netgear Nighthawk AX3000 | ||
Netgear Nighthawk AX5400 | <1.0.9.90 | |
Netgear Nighthawk AX5400 Firmware | ||
Netgear Nighthawk AX6000 Firmware | <1.0.9.90 | |
Netgear Nighthawk AX6000 Firmware | ||
Netgear Nighthawk AX11000 | <1.0.9.90 | |
Netgear Nighthawk Pro Gaming WiFi 6 Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47208 is considered a high severity vulnerability that allows unauthenticated attackers to execute arbitrary commands on the vulnerable device.
To fix CVE-2022-47208, update the firmware of your Netgear Nighthawk device to a version higher than 1.0.9.90.
CVE-2022-47208 affects the Netgear Nighthawk models with firmware versions up to 1.0.9.90, including AX1800, AX2400, AX3000, AX5400, AX6000, and AX11000.
CVE-2022-47208 requires the attacker to be on the same network segment as the router, making remote exploitation unlikely.
Currently, there is no public exploit code available for CVE-2022-47208, but the vulnerability is serious enough to warrant immediate attention.